Search Results for Universiti Teknologi Malaysia. Pusat Pengurusan Penyelidikan - Narrowed by: Mohd. Aizaini Maarof SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dUniversiti$002bTeknologi$002bMalaysia.$002bPusat$002bPengurusan$002bPenyelidikan$0026qf$003dAUTHOR$002509Author$002509Mohd.$002bAizaini$002bMaarof$002509Mohd.$002bAizaini$002bMaarof$0026ps$003d300?dt=list 2024-05-05T23:48:44Z Cryptanalysis in cryptographic algorithm design ent://SD_ILS/0/SD_ILS:461476 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Muhammad Reza Z'aba<br/>Author&#160;Muhammad Reza Z'aba,&#160;Badrisham Ahmad,&#160;Subariah Ibrahim,&#160;Mohd. Aizaini Maarof,&#160;National ICT Conference (2006 : Perlis)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C794<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/> Pioneering novel interdisciplinary research in Malaysia : artificial immune systems and immuno-informatics ent://SD_ILS/0/SD_ILS:437946 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Anjum Iqbal,&#160;Ismail Mat Amin,&#160;National Conference on Management of Technology and Technology Entrepreneurship (2005 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;QR182.2.C65 M63 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> An artificial immune system approach to anomaly detection in wireless ad hoc networks ent://SD_ILS/0/SD_ILS:438313 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Azri Abdul Majid<br/>Author&#160;Azri Abdul Majid,&#160;Mohd. Aizaini Maarof,&#160;International Conference on Intelligent Systems (2005 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A97 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> Distinct viewpoints in novel biologically inspired computational research : artificial immune systems ent://SD_ILS/0/SD_ILS:383961 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Anjum Iqbal<br/>Author&#160;Anjum Iqbal,&#160;Mohd. Aizaini Maarof,&#160;International Conference on Artificial Intelligence in Engineering and Technology (2nd : 2004 : Kota Kinabalu, Sabah)<br/>Format:&#160;Books<br/>Call Number&#160;QR182.2.C65 A55 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Solving time gap problems through the optimization of detecting stepping stone algorithm ent://SD_ILS/0/SD_ILS:383967 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar,&#160;Mohd. Aizaini Maarof,&#160;Anazida Zainal, 1967-,&#160;International Conference on Computer and Information Technology (2004 : Wunan, China)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A43 M63 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Artificial immune systems and immunoinformatics : bridging computation and immunology ent://SD_ILS/0/SD_ILS:384160 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Anjum Iqbal<br/>Author&#160;Anjum Iqbal,&#160;Mohd. Aizaini Maarof,&#160;Muhammad Yousaf Mairaj,&#160;International Conference on Biomedical Engineering (2004 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QR182.2.C65 A554 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Danger theory and intelligent data processing ent://SD_ILS/0/SD_ILS:410146 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Anjum Iqbal,&#160;International Conference on Computer and Information Technology (2004 : Istanbul, Turkey)<br/>Format:&#160;Books<br/>Call Number&#160;QR181 M63 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Biological inspiration for intrusion detection using system calls ent://SD_ILS/0/SD_ILS:387125 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Anjum Iqbal<br/>Author&#160;Anjum Iqbal,&#160;Mohd. Aizaini Maarof,&#160;Joint International Conference on Informatics and the International Conference on Research on Women in ICT (2004 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A55 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Ke arah pengurangan jurang masa sistem penindakbalasan pencerobohan melalui penggunaan pendekatan penjejakan pencerobohan pantas ent://SD_ILS/0/SD_ILS:353627 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar,&#160;Mohd. Aizaini Maarof,&#160;Subariah Ibrahim,&#160;Persidangan Sempena Pameran Penyelidikan dan Pembangunan IPTA (2003 : Kuala Lumpur )<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M54 2003<br/>Publication Date&#160;2003<br/> Towards anomalous behavior detection for intrusion detection system : buffer overflow attack ent://SD_ILS/0/SD_ILS:382272 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;International Arab Conference on Infermation Technology (2003 : Egypt)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P377 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> An application of danger theory to immunological model of distributed detection and process homeostasis ent://SD_ILS/0/SD_ILS:388441 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Anjum Iqbal<br/>Author&#160;Anjum Iqbal,&#160;Mohd. Aizaini Maarof,&#160;International Technical Conference on Circuits, System, Computers and Communications (2003 : Kang-Won Do, Korea)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.875 A54 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Enforcing multilevel security policies for network firewall ent://SD_ILS/0/SD_ILS:352173 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;International Conference Information Technology in Asia (2003 : Kuching, Sarawak)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C34 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Enhanced algorithm of decision tree techniques in data mining-based intrusion detection system ent://SD_ILS/0/SD_ILS:351693 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Masrul Amri Kamarudin<br/>Author&#160;Masrul Amri Kamarudin,&#160;Mohd. Aizaini Maarof,&#160;Subariah Ibrahim,&#160;International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D343 M37 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Detection and prevention of DoS attacks using intrusion detection system : intelligent nethost-sensor ent://SD_ILS/0/SD_ILS:352966 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;International Technical Conference on Circuits, System, Computers and Communications (2003 : Kang-Won Do, Korea)<br/>Format:&#160;Books<br/>Call Number&#160;TH9739 P37 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Intrusion classification for intrusion detection system using system calls method : design and methodology for attack classification ent://SD_ILS/0/SD_ILS:353396 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P374 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Towards anomalous behaviour detection for intrusion detection system ent://SD_ILS/0/SD_ILS:358822 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Seminar on Artificial Intelligence Applications in Industry (2003 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P375 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Towards experiencing a novel paradigm for intelligent computing : artificial immune system ent://SD_ILS/0/SD_ILS:358825 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Anjum Iqbal<br/>Author&#160;Anjum Iqbal,&#160;Mohd. Aizaini Maarof,&#160;Seminar on Artificial Intelligence Applications in Industry (2003 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.87 A54 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Multi-agent solution in UMTS VHE concept : architecture review ent://SD_ILS/0/SD_ILS:321472 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Azrinda Hassan Mohamad<br/>Author&#160;Azrinda Hassan Mohamad,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.I58 A974 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Detection of DoS attacks using intrusion detection sensors ent://SD_ILS/0/SD_ILS:322034 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Asia Pacific Optical and Wireless Communication Conference (2002: Shanghai, China)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P37 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Detection &amp; prevention of DoS attacks using intrusion detection system : design &amp; development ent://SD_ILS/0/SD_ILS:322481 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P376 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Mobile agent in data mining-based intrusion detection system ent://SD_ILS/0/SD_ILS:326771 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Masrul Amri Kamarudin,&#160;Subariah Ibrahim,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;TH9739 M34 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> File access permission change detection using immunological negative selection approach ent://SD_ILS/0/SD_ILS:328443 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Mohd. Yazid Idris<br/>Author&#160;Mohd. Yazid Idris,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M92 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Detection &amp; prevention of active sniffing on routing protocol ent://SD_ILS/0/SD_ILS:318319 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;International Symposium on Parallel Architecture, Algorithms and Networks (6th. : 2002 : Ateneo de Manila University, Phillippines)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.585 P37 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Smart laboratory real-time management system ent://SD_ILS/0/SD_ILS:321469 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Mazleena Salleh,&#160;Abdul Samad Ismail, 1930-,&#160;Anazida Zainal, 1967-,&#160;Rashidah Kadir<br/>Format:&#160;Books<br/>Call Number&#160;Q183.A1 S62 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> DoS attacks detection using intrusion detection system and system calls ent://SD_ILS/0/SD_ILS:321462 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Pathmenanthan Ramakrishna,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M346 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> An hybrid trust management model for MAS based trading society ent://SD_ILS/0/SD_ILS:321863 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Kanagaraj Krishna<br/>Author&#160;Kanagaraj Krishna,&#160;Mohd. Aizaini Maarof,&#160;National Conference on Computer Graphics &amp; Multimedia Applications in Global Industry (2002 : Melaka)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.I58 K36 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Implementing advance encryption standard (AES) in virtual private network environment ent://SD_ILS/0/SD_ILS:316193 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Nik Shahidah Afifi Md. Taujuddin<br/>Author&#160;Nik Shahidah Afifi Md. Taujuddin,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N73 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Towards solving time gap problems through the optimization of packet capture techniques ent://SD_ILS/0/SD_ILS:353376 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar,&#160;Mohd. Aizaini Maarof,&#160;Subariah Ibrahim,&#160;Conference on Information Technology in Asia (3rd : 2001 : Kuching, Sarawak)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 M545 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/> Workspace awareness in CSCW ent://SD_ILS/0/SD_ILS:301624 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Chua, Soo Yaw<br/>Author&#160;Chua, Soo Yaw,&#160;Lee, Ban Hup,&#160;Shamsul Sahibuddin,&#160;Mohd. Aizaini Maarof,&#160;International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D5 W67 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/> Virtual private network tunneling protocol ent://SD_ILS/0/SD_ILS:322134 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Nik Shahidah Afifi Md. Taujuddin<br/>Author&#160;Nik Shahidah Afifi Md. Taujuddin,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;Malaysian Science and Technology Congress (2001 : Universiti Sains Malaysia, Pulau Pinang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N74 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/> Client/server image protection system using hybrid security approach : steganography &amp; cryptography ent://SD_ILS/0/SD_ILS:168918 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;belum proses<br/> The development of attack response mechanism for intrusion detection system ent://SD_ILS/0/SD_ILS:372819 2024-05-05T23:48:44Z 2024-05-05T23:48:44Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Abdul Hanan Abdullah,&#160;Mohd. Yazid Idris,&#160;Subariah Ibrahim,&#160;Mohd. Foad Rohani<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T34 2006 af<br/>Edition&#160;1st ed.<br/>Publisher&#160;Penerbit UTM,<br/>Publication Date&#160;2006<br/>